Malware

hrtng IDA Plugin : Elevating IDA’s Capabilities For Advanced Malware Analysis

hrtng IDA plugin is a collection of tools, ideas and experiments from different sources I’ve found interesting and useful in my reversing work.

A practical guide to the reverse of a complex malware using the example of dissecting a FinSpy module with help of hrtng IDA plugin on securelist

There is no one place in menu where all functionality of the plugin grouped together. hrtng menu items placed closer to logically related standard IDA & Hex-Rays decompiler functions. Messages, menu items, popup windows and dialog boxes belong to this plugin are marked with “[hrt]” prefix.

The plugin requires Hex-Rays decompiler presence in your IDA installation. The plugin can be compiled with IDA SDK >= 7.3 but not well tested with old versions.

Special thanks to following peoples for their great plugins were used as base for my work:

  • Milan Bohacek, hexrays_tools and hexrays_hlight
  • HexRaysDeob by Rolf Rolles and Takahiro Haruyama
  • Karthik Selvaraj Krypton plugin
  • Ali Rahbar, Ali Pezeshk and Elias Bachaalany GraphSlick plugin
  • Markus Gaasedelen AVX support for the Hex-Rays x64 Decompiler

Features Of The Plugin:

Automation

  • Pull up comments from disasm to pseudocode view
  • Automatic renaming local and global variables, struct members
  • Automatic enum substitution
  • COM helper

Interactive Pseudocode Transformation

  • User interactive renaming/retyping assistance
  • Assists with changing type of structure member or local/global variable
  • reinterpret_cast
  • Collapse selection
  • “offsetof” convertor

Decryption

  • Strings/data/const decryption
  • Build stack strings (optionally with decryption)
  • Build array strings (optionally with decryption)
  • Mass strings decryption

For more information click here.

Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

SecHub : Streamlining Security Across Software Development Lifecycles

The free and open-source security platform SecHub, provides a central API to test software with…

8 minutes ago

Hawker : The Comprehensive OSINT Toolkit For Cybersecurity Professionals

Don't worry if there are any bugs in the tool, we will try to fix…

17 minutes ago

DarkFlare : Bypassing Censorship With TCP-Over-CDN Technology

A stealthy command line tool to create TCP-over-CDN(http) tunnels that keep your connections cozy and…

2 days ago

BootExecute EDR Bypass : A Deep Dive Into Early Execution Techniques

Boot Execute allows native applications—executables with the NtProcessStartup entry point and dependencies solely on ntdll.dll—to…

2 days ago

Hooka : Advanced Shellcode Loader Generation With Enhanced Evasion Techniques

Hooka is able to generate shellcode loaders with multiple capabilities. It is also based on…

2 days ago

GBounty : Streamlining Vulnerability Scanning For Web Applications

Multi-step website vulnerability scanner designed to help pentesters and bug hunters identify potential vulnerabilities in…

2 days ago